Information Technology Reference
In-Depth Information
Table 2. Best known µ ( b )forlarge v
v
max known
µ
(
b
) Min weight attaining max
µ
(
b
)
40
12
19
60
18
30
100
28
48
200
55
100
300
81
150
of this set as much as possible, subject to the condition that strength does not
decrease (i.e. that there is no d for which μ d decreases to μ ( b i )
1). If local
improvement is impossible, we flip two bits at random.
In order to implement this search, note that it is not necessary to recompute
q from scratch for every vector at Hamming distance 1 from b i .Instead,foreach
bit position i and for each tight distance d , we can compute in constant time
the effect on μ d of flipping bit i . Table 2 gives the strengths of the best vectors
found in this manner.
4 More General Independence Conditions
More generally we may consider conditions of the following form: for parameters
( r, r ), require that loss of any r messages does not prevent authentication of
more than r remaining messages. The problem considered above is the special
case r =1 ,r = 0. In the general case we have the following: for any set A with
# A = r , there can be no more than r indices i
A such that
#
{
j
|
i
S j ,A
S j =
∅}
<q.
This is a dicult condition to deal with in general, so we still consider some
special cases, and still consider only the sliding-window approach. If we have
r = 1 but r > 0, then we no are no longer maximizing the minimum value of
μ d ; instead we seek to maximize the ( r +1) th smallest value. The r smallest
values correspond to the r messages for which we are allowed to loose full
authentication.
If we have r> 1and r = 0, then we require that the loss of any set of r
messages does not prevent authentication of any other message. For this case we
define μ ( d 1 ,d 2 ,···d r ) as the number of indices j where b j =1 ,b j + d 1 =
= b j + d r =
0, and maximize q r ( b )=min μ d over all vectors d , where we may assume i<j
implies d i <d j since order does not matter. Note that the d i may be negative.
Trivialy we have
···
v + r
r +1
q r ( b )
(14)
since every realization of d =(1 , 2 ,
r ) (except at b v− 1 = 1) consists of a 1
followed by r zeros, and these cannot overlap. Table 3 gives the best known
values of q 2 for various memory bounds v ; in general these can be attained while
simultaneously coming close to the best known q = q 1 .
···
Search WWH ::




Custom Search